Artificial Intelligence Applications in Cybersecurity: Threat Detection, Challenges, Framework and Future Directions

Main Article Content

Mohammad Nawab Turan
Barialay Raufi
Allah Mohammad Razdar

Abstract

The rapid increase in cyber threats has prompted organizations to explore advanced solutions, with artificial intelligence (AI) emerging as a critical tool in cybersecurity. AI applications, including machine learning, deep learning, and hybrid models, provide enhanced threat detection, mitigation, and predictive capabilities. This study aims to systematically review the role of AI in cybersecurity, identify challenges and limitations, and propose emerging strategies for improving organizational resilience. A systematic literature review (SLR) methodology was employed, sourcing peer-reviewed articles, conference proceedings, and reputable journals from databases such as IEEE Xplore, ScienceDirect, Springer, MDPI, and Wiley. Boolean operators and keywords such as “AI,” “cybersecurity,” “threat detection,” “machine learning,” and “blockchain” were used, with inclusion criteria focused on studies addressing AI applications in threat detection and mitigation from 2019 to 2025. Data were extracted and synthesized using thematic analysis, categorizing findings into AI applications, challenges, and future directions. The results indicate that AI significantly enhances threat detection accuracy and operational efficiency, particularly through hybrid AI models, predictive threat intelligence, and blockchain integration. Key challenges include adversarial attacks, model explainability, data quality, and regulatory compliance. In conclusion, AI holds substantial potential to transform cybersecurity, provided technical, operational, and regulatory limitations are addressed. The study proposes a comprehensive AI-driven cybersecurity framework to guide organizations in developing robust, adaptive, and trustworthy security systems.

Article Details

How to Cite
Artificial Intelligence Applications in Cybersecurity: Threat Detection, Challenges, Framework and Future Directions. (2026). Immortalis Journal of Interdisciplinary Studies, 2(1), 421-439. https://doi.org/10.37600/vayj9g06
Section
Articles

How to Cite

Artificial Intelligence Applications in Cybersecurity: Threat Detection, Challenges, Framework and Future Directions. (2026). Immortalis Journal of Interdisciplinary Studies, 2(1), 421-439. https://doi.org/10.37600/vayj9g06

References

Ahmad, H. A., Al Shidi, M. S., & Al Mansoori, S. (2025). Artificial Intelligence (AI) cybersecurity: Review paper. World Journal of Arts, Education and Literature, 2(10), 1–12. https://doi.org/10.32604/JCS.2024.056164

Akhtar, Z. B., & Rawol, A. T. (2024). Harnessing artificial intelligence (AI) for cybersecurity: Challenges, opportunities, risks, future directions. Computing and Artificial Intelligence, 2(2), 1485. https://doi.org/10.59400/cai.v2i2.1485

Alazab, D. M. B. L. (2020). Cyber threat intelligence and AI: The future of cybersecurity. Journal of Information Security and Applications, 53, 102523. https://doi.org/10.1016/j.jisa.2020.102523

Alazab, M. (2020). Artificial intelligence and cybersecurity: A comprehensive overview. IEEE Security & Privacy, 18(3), 12–21. https://doi.org/10.1109/MSP.2020.2970787

Al Shidi, M. S. (2025). A comprehensive survey of AI and ML techniques for cybersecurity solutions. IEEE Access, 12, 12229–12256. https://doi.org/10.1109/ACCESS.2024.3355547

Azizi, M., Raufi, B., Razdar, A. M., & Hakimi, M. (2025). Auto Configured Mechanism for Detecting Malicious Attacks on Sensitive Data in Software Defined Network Controller. International Journal of Technology & Energy, 1(4), 139-154. https://doi.org/10.71364/ijte.v1i4.20

Alam, M. I., Khatri, S., Shukla, D. K., Misra, N. K., Satpathy, S., & Hakimi, M. (2025). Blockchain-based coal supply chain management system for thermal power plants. Discover Computing, 28(1), 1-32. https://doi.org/10.1007/s10791-025-09512-6

Al Siam, A., Alazab, M., Awajan, A., & Faruqui, N. (2024). A comprehensive review of AI’s current impact and future prospects in cybersecurity. IEEE Access, 13, 14029–14050. https://doi.org/10.1109/ACCESS.2025.3528114

Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access, 10, 93575–93600. https://doi.org/10.1109/ACCESS.2022.3204171

Chen, H., Shen, Z., Wang, Y., Xu, J., & Chen, H. (2024). Threat detection driven by artificial intelligence: Enhancing cybersecurity. World Journal of Innovation and Modern Technology. https://doi.org/10.53469/wjimt.2024.07(06).09

Choithani, T., Chowdhury, A., & Patel, S. (2024). AI and cybersecurity in cryptocurrency and banking systems. Annals of Data Science, 11, 103–135. https://doi.org/10.1007/s40745-022-00433-5

Choo, K. K. R. (2019). The role of artificial intelligence in cybersecurity. Computer Fraud & Security, 2019(7), 5–11. https://doi.org/10.1016/S1361 3723(19)30074 0

Hakimi, M., Tarashtwal, O., & Ghafory, H. (2026). Green Artificial intelligence Foundations, Applications, and Pathways to Sustainable Development. AMPLITUDO: Journal of Science and Technology Innovation, 5(1), 36-52. https://doi.org/10.56566/amplitudo.v5i1.524

Hakimi, M., Fazil, A. W., & Matin, Z. (2026). Examining Cybersecurity Factors Affecting the Adoption and Institutionalization of Internet of Things Technologies in Developing Countries. Journal of Advanced Computer Knowledge and Algorithms, 3(1), 26-36. https://doi.org/10.29103/jacka.v3i1.25505

Jivtode, M. L. (2025). Role of artificial intelligence in information security: Challenges and future directions. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(6), 481–488. https://doi.org/10.32628/CSEIT2511663

Kaur, H., & Tiwari, R. (2021). AI Powered cybersecurity: Trends and applications. International Journal of Computer Applications, 175(6), 1–6. https://doi.org/10.5120/ijca2021920502

Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804

Khan, A., & Tiwari, R. (2021). Endpoint detection and response using machine learning. Journal of Physics: Conference Series, 2062(1), 012013. https://doi.org/10.1088/1742-6596/2062/1/012013

Merlano, C. (2024). Enhancing cybersecurity through artificial intelligence and machine learning: A literature review. Journal of Cybersecurity Studies. https://doi.org/10.32604/JCS.2024.056164

Michael, K., Abbas, R., & Roussos, G. (2023). AI in cybersecurity: The paradox. IEEE Transactions on Technology and Society, 4(2), 104–109. https://doi.org/10.1109/TTS.2023.3280109

Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity. Journal of Big Data Analytics and Security. https://doi.org/10.1007/s10115-025-02429-y

Mohamed, N. (2025). Cutting edge advances in AI and ML for cybersecurity. Cogent Engineering. https://doi.org/10.1080/23311975.2025.2518496

Ozkan Okay, M., et al. (2024). A comprehensive survey of AI and cybersecurity solutions. IEEE Access, 12, 12229–12256. https://doi.org/10.1109/ACCESS.2024.3355547

Pal, R., Chakraborty, A., Bhar, A., & Ghosh, M. (2023). AI based cybersecurity solutions in threat detection and incident response. International Journal of Engineering and Computer Science, 12(11), 25942–25947. https://doi.org/10.18535/ijecs/v12i11.4776

Patel, A., Pandey, P., Ragothaman, H., Molleti, R., & Peddinti, D. R. (2025). Generative AI for automated security operations in cloud computing. Proceedings of the 2025 IEEE 4th International Conference on AI in Cybersecurity. https://doi.org/10.1109/ICAIC63015.2025.10849302

Ramos, S., & Ellul, J. (2024). Blockchain for AI: Enhancing cybersecurity compliance. International Cybersecurity Law Review, 5, 1–20. https://doi.org/10.1365/s43439-023-00107-9

Saleh, A. M. S. (2024). Blockchain for secure and decentralized AI in cybersecurity: A comprehensive review. Blockchain: Research and Applications, 5, 100193. https://doi.org/10.1016/j.bcra.2024.100193

Salem, A. H., Azzam, S. M., & Emam, O. E. (2024). Advancing cybersecurity: A comprehensive review of AI driven detection techniques. Journal of Big Data, 11(105). https://doi.org/10.1186/s40537-024-00957-y

Shukla, A. (2022). Leveraging AI and ML for advanced cybersecurity defense. Journal of Artificial Intelligence & Cloud Computing. https://doi.org/10.32604/jcs.2024.056164

Sontan, A. D., & Samuel, S. V. (2024). The intersection of artificial intelligence and cybersecurity: Challenges and opportunities. World Journal of Advanced Research and Reviews, 21(2), 1720–1736. https://doi.org/10.30574/wjarr.2024.21.2.0607

Sun, Q., Li, D., & Wang, L. (2025). The role of artificial intelligence in predicting and preventing cyber attacks. Journal of Industrial Engineering and Applied Science. https://doi.org/10.5281/zenodo.12786734

Tarashtwal, O., Hakimi, M., & Naderi, Z. (2025). The role of artificial intelligence in achieving the UN sustainable development goals (SDGs) in low income nations. Jurnal Ilmiah Akuntansi dan Bisnis, 10(2), 163-178. https://doi.org/10.38043/jiab.v10i2.7184

Thawait, N. K. (2024). Machine learning in cybersecurity: Applications, challenges, and future directions. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10(3). https://doi.org/10.32628/CSEIT24102125

Yadav, A., Kumar, A., & Singh, V. (2023). Open source intelligence in cybersecurity: Review and future perspectives. Artificial Intelligence Review, 56(11), 12407–12438. https://doi.org/10.1007/s10462-023-10454-y

Zhang, Z., Ning, H., & Shi, F. (2022). Artificial intelligence in cybersecurity: Research advances, challenges, and opportunities. Artificial Intelligence Review, 55, 1029–1053. https://doi.org/10.1007/s10462-021-09976-0